Cybersecurity & Digital Protection

Last Updated: 24 April 2025

  1. Our Commitment to Security

    Nocturnal Capital Partners maintains the highest standards of cybersecurity to protect our investors, partners, and confidential information. As a private equity firm handling sensitive financial data, we employ multi-layered security measures and continuous monitoring to safeguard against evolving digital threats.

  2. Recognising Digital Threats

    2.1 Common Fraud Attempts

    • Phishing: Fraudulent communications impersonating legitimate entities to extract sensitive information

    • Business Email Compromise: Sophisticated attacks targeting financial transactions and confidential data

    • Credential Harvesting: Fake login portals designed to capture authentication details

    • Social Engineering: Psychological manipulation to gain unauthorised access to systems or information

    2.2 Warning Signs

    • Unsolicited requests for passwords, financial information, or authentication codes

    • Urgent or threatening language demanding immediate action

    • Slight variations in email addresses or website URLs mimicking legitimate sources

    • Requests to bypass normal security protocols or verification processes

  3. Our Security Framework

    3.1 Technical Safeguards

    • Multi-Factor Authentication: Required for all system and portal access

    • End-to-End Encryption: All sensitive data encrypted in transit and at rest

    • Zero-Trust Architecture: Continuous verification of all access requests

    • Advanced Threat Protection: Real-time monitoring and threat detection systems

    • Secure Communication Channels: Encrypted platforms for all client communications

    3.2 Operational Protocols

    • Regular Security Audits: Comprehensive internal and third-party assessments

    • Employee Training: Ongoing cybersecurity awareness and response training

    • Incident Response Planning: Documented procedures for security event management

    • Vendor Security Standards: Strict requirements for all third-party service providers

    • Physical Security Controls: Restricted access to systems and data storage

  4. Your Role in Security

    4.1 Best Practices for Digital Security

    • Use unique, complex passwords for each financial account

    • Enable multi-factor authentication wherever available

    • Verify the authenticity of unexpected requests through established channels

    • Keep systems and applications updated with the latest security patches

    • Monitor accounts regularly for unusual activity

    4.2 Communication Protocols

    • We will never request sensitive information via unsolicited email

    • All official communications will originate from verified @nocturnalpe.com addresses

    • Secure portal access is required for sensitive document exchange

    • Verbal confirmation is required for significant transaction instructions

  5. Incident Response

    In the event of a suspected security incident:

    5.1 Immediate Actions

    • Contact your relationship manager directly via verified phone numbers

    • Freeze affected accounts if unauthorised access is suspected

    • Preserve evidence of suspicious communications

    5.2 Our Response Protocol

    • Immediate investigation and containment measures

    • Regulatory and law enforcement coordination where required

    • Transparent communication with affected parties

    • Comprehensive post-incident analysis and system hardening

  6. Continuous Improvement

    Cybersecurity requires ongoing adaptation to emerging threats. We maintain:

    • 24/7 security monitoring and threat intelligence

    • Regular review and enhancement of security controls

    • Industry collaboration and information sharing

    • Compliance with evolving regulatory requirements

  7. Contact and Reporting

    For security concerns or suspected fraud:


    Primary Contact: Your designated relationship manager

    Email: security@nocturnalpe.com (for security-specific matters)

    General Inquiries: info@nocturnalpe.com


    Immediately report any suspicious communications claiming to represent Nocturnal Capital Partners.

Important: This document outlines our security framework but does not create additional legal obligations or modify existing agreements.
Specific security protocols are detailed in our investor documentation and are subject to periodic updates.